Tarmac sits between your agents and the compute they consume, holds the budget, and enforces it before money is spent. Per-run, monthly, and yearly caps as hard limits — atomic authorization holds, modeled on a card network. No more month-end surprises.
Coding, research, monitoring and data-pipeline agents already hold real budgets. Today's tools observe, alert and throttle — none of them prevent a breach. The pain is industry-wide and compounding faster than any adjacent vendor is moving to govern it.
Year-over-year growth in the median enterprise's monthly LLM spend — outpacing every other line item in the cloud bill, with no governance layer in front of it.
A single multi-step agentic decision cycle can cost three orders of magnitude more than a simple call. Every new tool, every retry, multiplies the bill.
Every run is gated through an atomic authorization hold against the per-run, monthly, and yearly caps. If it doesn't fit, it doesn't run. If it fits, Tarmac picks the heaviest model the live price and remaining budget allow.
Define a per-run max, monthly and yearly caps. Each agent carries a description and a priority tier — revenue-critical work is protected over nice-to-have work.
The Compute Price Signal continuously aggregates model and GPU pricing. The ledger keeps remaining budget to the cent, across every concurrent run.
For every run, Tarmac selects the heaviest model that the live price and remaining budget allow — lighter to protect the budget, heavier when there's room.
An atomic authorization hold is placed before the call is admitted. Over-cap runs are throttled to a lighter tier — or held entirely if no tier fits.
One reconciled ledger powers a live ops view and a finance-grade set of books: statements, itemized receipts, attribution and burn-rate projection.
The platform leader gets a live control room. The CFO gets a managed budget with statements and forecast. Both views read from the same enforced ledger — never out of sync, never reconciled by hand.
A live control room over the entire fleet. Watch admits and holds in real time, rebalance by priority before a cap is breached, and ship without fear of the bill.
AI compute spend that finally behaves like a managed budget. Monthly statements, itemized receipts, clean attribution to team and agent, and a burn-rate projection that doesn't move at month-end.
Each agent's compute lane — an inference-API model family or a fixed GPU type — is set once at onboarding. What Tarmac moves dynamically, per run, is the model tier the agent runs: lighter to protect the budget, heavier when there's room.
Onboard-time decision: family, region, fallback. Predictable for security review, simple for compliance, frozen against drift.
Adjacent tools exist, and major platforms are moving in — but they cluster into five groups, and the same gap runs through all of them. None enforce a hard cap before spend. None rebalance a fleet by business priority. None produce books that engineering and finance both trust.
Tarmac never resells compute. The governance fee scales with the spend we protect; the performance fee earns only when we deliver savings. Our incentives point the same direction as yours.
A proportion of the spend Tarmac protects — never a flat platform tax. Same rate from your first agent to your thousandth.
For every run, the gap between what the task would have cost at the heaviest model and what it actually cost. Summed across the fleet, traceable to every receipt.
Tarmac sits in the request path as a proxy with short-lived, scoped tokens issued per workspace. No standing read on your model provider account. No keys at rest in our control plane.
scoped-tokens · per-workspace
The ledger is the system of record. When the budget engine is unhealthy, the proxy refuses to admit rather than letting a run leak through. Budget breach is a designed-against, tested property.
concurrency-invariant · CI gate
GRC platform live before the first design partner. Annual third-party penetration tests, a public trust center, and SOC 2 Type II on the calendar before the first enterprise opportunity — not after.
SOC 2 · vCISO · pentest · trust center
We're working with a small cohort of AI-native and digital-native teams to put Tarmac into production on real agent fleets. Discounted pricing, direct access to the founder, and the right to shape the product before it's set.